The Kelser Blog covers technology and business topics such as Cybersecurity, IT Lifecycle Management, Modern Data Center, Workforce Enablement, and more.
It can be scary out there in the digital world. It seems like not a week goes by where we don’t hear about phishing emails, unpatched vulnerabilities, or the latest strain of ransomware exposing the data of millions of people and businesses to the prying eyes of malicious actors. Every person and every business are potential targets with some of the largest companies in the world susceptible to the same vulnerabilities as the average Joe at their home computer (phishing being a prime example). But all is not lost as October is National Cybersecurity Awareness Month! What better time to review your cybersecurity practices, discover where you can make improvements, and seize the chance to make positive change? Consider it a fall “spring cleaning” for your digital life and business.
In many ways, Connecticut is a state in search of an identity. Could we become known as the Cybersecurity state? In Europe, some already know us that way. After a very enlightening conversation with Art House, Chief Cybersecurity Risk Officer for the State of Connecticut toward the end of last year, he was gracious enough to come back to the Kelser offices this fall for a follow up interview to give us the latest on the global cybersecurity landscape and how Connecticut fits in.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
A well-known Connecticut business recently hired Kelser to hack them. Here’s how we did it. Over the past year, we’ve been working with Hoffman Auto Group, one of Connecticut’s largest auto dealers, to strengthen their cybersecurity posture and make sure their customer data is as safe as possible. After putting all the latest technology in place, it came time to address employee awareness since most cyber-attacks involve human error.
IT hardware, like cars, are depreciating assets. As soon as you drive them off the proverbial lot, they begin to lose value. The reason for this depreciation is twofold: the product will eventually wear down, and newer models will be released with greater specs. Keeping this in mind, how often should you refresh your IT assets? To understand the answer to this question, let’s look at the IT-asset lifecycle management.
Last month, I was thrilled to be invited back to the 94.9 FM CBS Radio airwaves for another episode of Real Estate Radio (listen to my first appearance here). I actually love this radio show. It seems so random—a full hour about real estate—but the hosts Byron Lazine and Pat Kenny use real estate as a jumping off point to talk about a wide range of topics that affect quality of life and where people choose to live. This time around we focused on hot topics in the tech world including Facebook privacy and the GDPR, ransomware, and phishing following high-profile cyber attacks in Connecticut.
Many times, when looking for a managed service provider (MSP), price is the main issue that floats to top of mind. Unfortunately, you likely don’t have an unlimited pot of money to work with and this can cause you to lose track of why you’re looking for an MSP in the first place. While cost is a factor, it’s important not to overlook the fact that you’re looking for a trusted partner that can help move your organization forward by transforming your IT department from an operating drain into a critical business asset.